Open Access Open Access  Restricted Access Subscription Access

A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups


Affiliations
1 Department of Mathematics, PSIT, Kanpur, India
2 Department of Computer Science, PSIT, Kanpur, India
3 Department of Electronics & Communication, PSIT, Kanpur, India
4 Department of Electronics & Communication, REC, Kannauj, India
5 Department of Computer Science, IET, Lucknow, India
 

The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.

Keywords

Conjugacy Search Problem, Decomposition Problem, Key Agreement, Non Commutative Groups, Wireless Communication.
User
Notifications
Font Size


  • A New Key Agreement Protocol Using BDP and CSP in Non Commutative Groups

Abstract Views: 370  |  PDF Views: 0

Authors

Atul Chaturvedi
Department of Mathematics, PSIT, Kanpur, India
Manoj Kumar Misra
Department of Computer Science, PSIT, Kanpur, India
Varun Shukla
Department of Electronics & Communication, PSIT, Kanpur, India
Neelam Srivastava
Department of Electronics & Communication, REC, Kannauj, India
S. P. Tripathi
Department of Computer Science, IET, Lucknow, India

Abstract


The available key agreement schemes using number theoretic, elliptic curves etc are common for cryptanalysts and associated security is vulnerable. This vulnerability further increases when we talk about modern efficient computers. So there is a need of providing new mechanism for key agreement with different properties so intruders get surprised and communication scenarios becomes stronger than before. In this paper, we propose a key agreement protocol which works in a non commutative group. We prove that our protocol meets the desired security attributes under the assumption that Conjugacy Search Problem and Decomposition Problem are hard in non commutative groups.

Keywords


Conjugacy Search Problem, Decomposition Problem, Key Agreement, Non Commutative Groups, Wireless Communication.

References